0% Complete
English
صفحه اصلی
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Secure Mutual Authentication and Key Agreement Protocol for IoT
نویسندگان :
Mostafa Sadeghi
1
1- دانشگاه آزاد اسلامی واحد خوراسگان
کلمات کلیدی :
Internet of Things،Authentication،Key Agreement،Formal Proof،Scyther Tool
چکیده :
Given the rapid growth and development of the Internet of Things and its applications in various sectors of human life, the advantages that this technology has brought to human life are not hidden from anyone. For this reason, many researchers have focused on the Internet of Things and its various applications in various sectors. On the other hand, considering that this technology collects data using sensors and sends it over an insecure platform, such as the Internet, it has raised numerous security concerns. For this reason, ensuring the security and confidentiality of data exchanged in the Internet of Things environment is currently one of the hot topics for researchers. In previous studies, researchers have not been able to provide designs that encompass all security aspects of the Internet of Things platform. For example, previous designs have not been able to resist all known attacks and also meet various security needs, such as perfect forward secrecy. In this regard, this article presents a protocol for authentication and key agreement between Internet of Things entities to ensure the security and confidentiality of data exchanged in this environment. Next, we showed in two formal ways using the Scyther tool and informally that the proposed protocol, in addition to meeting various security needs, is also resistant to known attacks and considers all security aspects of data exchange in the Internet of Things. Finally, the results of the performance evaluation of the proposed protocol indicate that it has a better execution time and introduces less overhead to the system compared to other protocols.
لیست مقالات
لیست مقالات بایگانی شده
Evaluating LLMs in Persian News Summarization
Arya VarastehNezhad - Reza Tavasoli - Mostafa Masumi - Seyed Soroush Majd - Mehrnoush Shamsfard
یک رویکرد سریع تحلیل و شناسایی آسیب پذیری Next-Intent در برنامه های کاربردی اندروید
زهرا کلوندی - دکتر مهدی سخائی نیا زهرا کلوندی - مهدی سخائی نیا -
AI-Powered Beauty Insights: Sentiment Analysis in a Low-Resource Language
Sajedeh Talebi - Neda Abdolvand - Fatemeh Mahdian
طراحی سیستم پشتیبانی تجاری با استفاده از فناوری هوش مصنوعی
سجاد قطعی - زهره عربی - محمد روحی
Using Trust Statements and Ratings by GraphSAGE to Alleviate Cold Start in Recommender Systems
Seyedeh Niusha Motevallian - Dr Seyed Mohammad Hossein Hasheminejad
A Swarm Intelligence Approach to Design Optimal Repeaters in Multilayer Graphene Nanoribbon Interconnects
Majid Sanaeepur - Maryam Momeni
An ESB-based Architecture for Authentication as a Service Through Enterprise Application Integration
Masoumeh Hashemi - Mehdi Sakhaei-nia - Morteza Yousef Sanati
Attention-Enhanced Ensemble Learning for Automated Stenosis Detection in X-ray Coronary Angiography Videos
Marzieh Sadat Hosseini - Ahmad R. Naghsh-Nilchi - Mehran Safayani - Masoumeh Sadeghi
AOV-IDS: Arithmetic Optimizer with Voting classifier for Intrusion Detection System
Amir Soltany Mahboob - Mohammad Reza Ostadi Moghaddam - Shima Yousefi
A Mathematical Optimization Approach for Preference Learning in Movie Recommender Systems with Shared Accounts
Milad Khademali - Fazlollah Aghamohammadi - Marjan Kaedi - Alireza Nasiri
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2